Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 22.837  Word version:  19.3.0

Top   Top   Up   Prev   Next
0…   4   5…   5.2…   5.3…   5.4…   5.5…   5.6…   5.7…   5.8…   5.9…   5.10…   5.11…   5.12…   5.13…   5.14…   5.15…   5.16…   5.17…   5.18…   5.19…   5.20…   5.21…   5.22…   5.23…   5.24…   5.25…   5.26…   5.27…   5.28…   5.29…   5.30…   5.31…   5.32…   6…   7…

 

5.16  Use case on Protection of Sensing Informationp. 51

5.16.1  Descriptionp. 51

This use case re-uses the scenario where a UE performs sensing to detect intruders in the home, as per use case 5.1 (intruder detection in smart home). The additional aspect introduced in this use case is that there is an unauthorised user that is attempting to collect sensing information from Mary's home.

5.16.2  Pre-conditionsp. 52

Refer to use case 5.1 where 5G CPEs (i.e. UEs) are set up to detect intruders when Mary's home is vacant as her family is on holiday.

5.16.3  Service Flowsp. 52

An unauthorised user is in the vicinity of Mary's home.
In Mary's home, the 5G CPE transmits 5G signals, and the reflected signals are used by the unauthorised user's device to collect sensing information.
As the 5G signals from the CPEs in Mary's home are protected, the unauthorised user's device fails to derive any sensing information.

5.16.4  Post-conditionsp. 52

The privacy of sensing information in Mary's home is preserved.
The unauthorised user cannot use the 5G signals to detect that the family is not at home.

5.16.5  Existing features partly or fully covering the use case functionalityp. 52

None

5.16.6  Potential New Requirements needed to support the use casep. 52

[PR 5.16.6-1]
The 5G system shall provide a mechanism to protect identifiable information that can be derived from the 3GPP sensing data from eavesdropping.

Up   Top   ToC